Clase: Worm
Los gusanos se propagan en las redes informáticas a través de los recursos de la red. A diferencia de Net-Worms, un usuario debe iniciar un Worm para que se active. Este tipo de gusano busca redes de computadoras remotas y se copia en directorios que son accesibles para lectura / escritura (si encuentra alguno). Además, estos gusanos utilizan las funciones integradas del sistema operativo para buscar directorios de red accesibles y / o buscan aleatoriamente computadoras en Internet, se conectan a ellas e intentan obtener acceso completo a los discos de estas computadoras. Esta categoría también cubre aquellos gusanos que, por una razón u otra, no encajan en ninguna de las otras categorías definidas anteriormente (por ejemplo, gusanos para dispositivos móviles)Más información
Plataforma: Win32
Win32 es una API en sistemas operativos basados en Windows NT (Windows XP, Windows 7, etc.) que admite la ejecución de aplicaciones de 32 bits. Una de las plataformas de programación más extendidas en el mundo.Familia: Worm.Win32.Vobfus
No family descriptionExamples
CC2FCA930B8305BF0CA3E68B4523811C5530FAB9B4C1C8DD38BAB1FE07464635
D006669031E0760FC1DBB2A7796FE938
DD067BB260FF387320A2BEAD841BE6F5
85294A99E5DE5BA3BCEB41090F485D14
Tactics and Techniques: Mitre*
TA0005
Defense Evasion
The adversary is trying to avoid being detected.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
T1036
Masquerading
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.
Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site) Masquerading may also include the use of Proxy or VPNs to disguise IP addresses, which can allow adversaries to blend in with normal network traffic and bypass conditional access policies or anti-abuse protections.
Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site) Masquerading may also include the use of Proxy or VPNs to disguise IP addresses, which can allow adversaries to blend in with normal network traffic and bypass conditional access policies or anti-abuse protections.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.